Explore: Internet Security Measures
Discover books, insights, and more — all in one place.
Learn more about Internet Security Measures with top reads curated from trusted sources — all in one place.
AI-Generated Overview About “internet--security-measures”:
Books Results
Source: The Open Library
The Open Library Search Results
Search results from The Open Library
1The Hacker Crackdown
Law and Disorder on the Electronic Frontier
By Bruce Sterling

“The Hacker Crackdown” Metadata:
- Title: The Hacker Crackdown
- Author: Bruce Sterling
- Language: English
- Number of Pages: Median: 314
- Publisher: ➤ IndyPublish - TREDITION CLASSICS - tredition - Project Gutenberg - CreateSpace Independent Publishing Platform - IndyPublish.com - Bantam Books - Penguin Books Ltd - Bantam - Viking - Sterling Bruce - Open Road Integrated Media, Inc. - NetLibrary - Penguin
- Publish Date: ➤ 1992 - 1993 - 1994 - 2002 - 2013 - 2015 - 2016 - 2020
- Publish Location: ➤ Boulder, Colo - New York, Toronto, London, Sydney, Auckland - London - New York - Champaign, Ill - McLean, Virginia
“The Hacker Crackdown” Subjects and Themes:
- Subjects: ➤ Corrupt practices - Computer crimes - Telephone - Programming (Electronic computers) - Computer programming - Hacker - Computerkriminalität - New York Times reviewed - Criminalité informatique - Téléphone - Pratiques déloyales - Programmation (Informatique) - White collar crimes - Computer viruses - Internet, security measures - Data encryption (computer science) - Computers, history - Sociology
- Places: United States
Edition Identifiers:
- The Open Library ID: ➤ OL54742616M - OL54747319M - OL54824725M - OL55427601M - OL57633835M - OL43380241M - OL42944625M - OL29532446M - OL29749524M - OL22816719M - OL18544317M - OL7829179M - OL22246764M - OL7643095M - OL1715165M - OL8402644M - OL8402645M
- Online Computer Library Center (OCLC) ID: 44961321 - 59938780 - 25914955
- Library of Congress Control Number (LCCN): 92017496
- All ISBNs: ➤ 9780670849000 - 9781535486903 - 9781536991697 - 9780553563702 - 9781519239945 - 9780140177343 - 9780553080582 - 1519239947 - 1504063090 - 9781519342775 - 1535486902 - 055356370X - 1404306404 - 1519342772 - 0670849006 - 3849523241 - 9781404306417 - 1536991694 - 9783849512941 - 9783849523244 - 3849512940 - 1404306412 - 9780585152493 - 0585152497 - 0140177345 - 9781404306400 - 055308058X - 9781504063098
First Setence:
"On January 15, 1990, AT&T's long-distance telephone switching system crashed."
Author's Alternative Names:
"Michael Bruce Sterling"Access and General Info:
- First Year Published: 1992
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find The Hacker Crackdown at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
2Katie.com
By Tarbox, Katherine., Katherine Tarbox and Katherine Tarbox

“Katie.com” Metadata:
- Title: Katie.com
- Authors: Tarbox, Katherine.Katherine TarboxKatherine Tarbox
- Languages: ➤ English - vie - Spanish; Castilian - español, castellano
- Number of Pages: Median: 196
- Publisher: ➤ Plume - Dutton - Perfection Learning Prebound - Umbriel - Turtleback Books Distributed by Demco Media - Orion Media - Orion Publishing Group, Limited - NXB Huoi nhà văn - Sauerländer - Tandem Library - Nhã Nam - Rebound by Sagebrush - Orion mass market paperback
- Publish Date: 2000 - 2001 - 2003 - 2006
- Publish Location: Hà Nuoi - New York - London
“Katie.com” Subjects and Themes:
- Subjects: ➤ Teenage girls - Sexually abused teenagers - Weibliche Jugend - Verlieben - Sexual harassment - Internet and teenagers - Case studies - Chatten <Kommunikation> - Internet - Child molesters - Biography - New York Times reviewed - Online chat groups - Internet, security measures - Computer crimes - Internet and children - Girls, biography
- People: Katherine Tarbox
- Places: Connecticut - New Canaan - United States
Edition Identifiers:
- The Open Library ID: ➤ OL8936155M - OL23079037M - OL9521188M - OL9501315M - OL7590927M - OL9153159M - OL35662922M - OL9561480M - OL30194253M - OL9858003M - OL59274M - OL18790717M
- Online Computer Library Center (OCLC) ID: 44764052 - 76190558
- Library of Congress Control Number (LCCN): 99087503
- All ISBNs: ➤ 9780752842981 - 9780525945437 - 1417748494 - 0606217932 - 9788495618054 - 9783794148394 - 9780452282537 - 0452282535 - 0752842986 - 0752841343 - 0613576233 - 3794148398 - 9780613576239 - 8495618052 - 9780606217934 - 0756913632 - 9781417748495 - 0525945431 - 9780752841342 - 9780756913632
First Setence:
"I can't tell you what all thirteen-year-old girls are like, but I can tell you what I was like."
Access and General Info:
- First Year Published: 2000
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Katie.com at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
3Google Hacks
By Tara Calishain and Rael Dornfest

“Google Hacks” Metadata:
- Title: Google Hacks
- Authors: Tara CalishainRael Dornfest
- Languages: ➤ English - Spanish; Castilian - español, castellano
- Number of Pages: Median: 443
- Publisher: ➤ O'Reilly - O'Reilly Media, Incorporated - O'Reilly Media, Inc. - Anaya Multimedia - O'Reilly Media
- Publish Date: 2003 - 2004 - 2005 - 2006
- Publish Location: ➤ Beijing - Cambridge - Sebastopol, CA - Madrid, España
“Google Hacks” Subjects and Themes:
- Subjects: ➤ Computer software - Google - Handbooks, manuals - Handbooks, manuals, etc - Internet programming - Internet searching - Reusability - Web search engines - World wide web - Internet - Computer software -- Reusability - Internet, security measures - Reutilizacion - Motores de busqueda - Buscadores de Internet - Soporte logico - Programacion internet - Motores de busqueda en Internet
Edition Identifiers:
- The Open Library ID: ➤ OL9154526M - OL9131760M - OL7581167M - OL17157771M - OL7581449M - OL29138803M - OL36800471M - OL3434705M - OL3703975M - OL18393261M
- Online Computer Library Center (OCLC) ID: 85789296 - 52622917 - 51925851
- Library of Congress Control Number (LCCN): 2003271658 - 2006285771 - 2005276157
- All ISBNs: ➤ 0596527063 - 9780596527068 - 9788497630825 - 8497630823 - 9780596529987 - 9780596553708 - 0596529988 - 9780596004477 - 0596008570 - 0596004478 - 8441516480 - 0596553706 - 9788441516489 - 9780596008574
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Google Hacks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
4Web hacking
By Stuart McClure

“Web hacking” Metadata:
- Title: Web hacking
- Author: Stuart McClure
- Language: English
- Number of Pages: Median: 492
- Publisher: Addison-Wesley
- Publish Date: 2003
- Publish Location: Boston
“Web hacking” Subjects and Themes:
- Subjects: ➤ World Wide Web - Security measures - Internet - Hackers - Computer networks, security measures - Internet, security measures - Computer networks - Web sites - Computer security
Edition Identifiers:
- The Open Library ID: OL18507921M
- Library of Congress Control Number (LCCN): 2002107711
- All ISBNs: 0201761769 - 9780201761764
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Web hacking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
5Privacy in the Age of Big Data
By Theresa M. Payton and Theodore Claypoole

“Privacy in the Age of Big Data” Metadata:
- Title: Privacy in the Age of Big Data
- Authors: Theresa M. PaytonTheodore Claypoole
- Language: English
- Number of Pages: Median: 259
- Publisher: ➤ Rowman & Littlefield Publishers, Incorporated - Rowman & Littlefield
- Publish Date: 2014
- Publish Location: Boulder, CO - Lanham, MD
“Privacy in the Age of Big Data” Subjects and Themes:
- Subjects: ➤ Data protection - Big data - Electronic surveillance - Consumer protection - Right of Privacy - Internet, security measures
Edition Identifiers:
- The Open Library ID: OL35940353M - OL25616244M - OL35806667M
- Online Computer Library Center (OCLC) ID: 855957401
- Library of Congress Control Number (LCCN): 2013417859
- All ISBNs: ➤ 9781442225459 - 1442225467 - 9781306373944 - 9781442225466 - 1442225459 - 1306373948
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Privacy in the Age of Big Data at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
6The Complete Idiot's Guide to Internet Privacy and Security
By Preston Gralla

“The Complete Idiot's Guide to Internet Privacy and Security” Metadata:
- Title: ➤ The Complete Idiot's Guide to Internet Privacy and Security
- Author: Preston Gralla
- Language: English
- Number of Pages: Median: 384
- Publisher: Alpha
- Publish Date: 2002
“The Complete Idiot's Guide to Internet Privacy and Security” Subjects and Themes:
- Subjects: ➤ Computer security - Internet - Security measures - Internet, security measures - Privacy, right of - Long Now Manual for Civilization
Edition Identifiers:
- The Open Library ID: OL7269307M - OL9224021M
- Library of Congress Control Number (LCCN): 2001098465
- All ISBNs: 9780028643212 - 0028643216
First Setence:
"Surprise! If you visit the Internet, someone might be watching you."
Access and General Info:
- First Year Published: 2002
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find The Complete Idiot's Guide to Internet Privacy and Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
7Building Internet Firewalls
By D. Brent Chapman and Elizabeth D. Zwicky

“Building Internet Firewalls” Metadata:
- Title: Building Internet Firewalls
- Authors: D. Brent ChapmanElizabeth D. Zwicky
- Language: English
- Number of Pages: Median: 517
- Publisher: ➤ O'Reilly - O'Reilly Media, Incorporated - O'Reilly & Associates
- Publish Date: 1995 - 2000
- Publish Location: ➤ Sebastopol, CA - Beijing - Cambridge, Mass - Cambridge, MA
“Building Internet Firewalls” Subjects and Themes:
- Subjects: ➤ Firewalls (Computer security) - Internet, security measures - Computer networks, security measures - Computer networks - Security measures - Internet - Réseaux d'ordinateurs - Sécurité - Mesures - Coupe-feu (Sécurité informatique) - COMPUTERS - Security - Computerbeveiliging - General - Viruses - Com060040 - Cs.cmp_sc.app_sw - Cs.cmp_sc.intrn_www - Cs.cmp_sc.secur
Edition Identifiers:
- The Open Library ID: ➤ OL6785816M - OL36706334M - OL36797489M - OL36777429M - OL551907M - OL17456506M
- Online Computer Library Center (OCLC) ID: 33212964 - 42922353 - 43864472
- Library of Congress Control Number (LCCN): 00039954 - 96133474
- All ISBNs: ➤ 9780596551889 - 1565921240 - 0596551886 - 9781565928718 - 9781565921245 - 0596515669 - 9780596515669 - 1565928717 - 9780596150167 - 0596150164
Access and General Info:
- First Year Published: 1995
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Building Internet Firewalls at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
8The smart girl's guide to privacy
By Violet Blue

“The smart girl's guide to privacy” Metadata:
- Title: ➤ The smart girl's guide to privacy
- Author: Violet Blue
- Language: English
- Number of Pages: Median: 170
- Publisher: No Starch Press, Incorporated
- Publish Date: 2015
“The smart girl's guide to privacy” Subjects and Themes:
- Subjects: ➤ Safety measures - Computer crimes - Internet - Internet and women - Security measures - Right of Privacy - Prevention - Crime prevention - Internet, security measures - Internet, safety measures - Privacy, right of
Edition Identifiers:
- The Open Library ID: OL34027215M - OL27186605M
- Online Computer Library Center (OCLC) ID: 896860507
- Library of Congress Control Number (LCCN): 2015013420
- All ISBNs: 1593276486 - 9781457189944 - 9781593276485 - 1457189941
Access and General Info:
- First Year Published: 2015
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find The smart girl's guide to privacy at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
9Cyber Reconnaissance, Surveillance and Defense
By Robert Shimonski

“Cyber Reconnaissance, Surveillance and Defense” Metadata:
- Title: ➤ Cyber Reconnaissance, Surveillance and Defense
- Author: Robert Shimonski
- Language: English
- Number of Pages: Median: 258
- Publisher: ➤ Syngress - Elsevier/Syngress - Elsevier Science & Technology Books
- Publish Date: 2014
“Cyber Reconnaissance, Surveillance and Defense” Subjects and Themes:
- Subjects: ➤ Internet, security measures - Computer security - Computer crimes - Electronic intelligence - Internet in espionage - Cyber intelligence (Computer security) - Internet - Security measures
Edition Identifiers:
- The Open Library ID: OL28351805M - OL35779427M
- Online Computer Library Center (OCLC) ID: 885228860 - 895288472
- Library of Congress Control Number (LCCN): 2014031815
- All ISBNs: 0128014687 - 9780128013083 - 9780128014684 - 0128013087
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Cyber Reconnaissance, Surveillance and Defense at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
10Internet security
By Kenneth Einar Himma

“Internet security” Metadata:
- Title: Internet security
- Author: Kenneth Einar Himma
- Language: English
- Number of Pages: Median: 292
- Publisher: Jones and Bartlett Publishers
- Publish Date: 2007
- Publish Location: London - Sudbury, Mass
“Internet security” Subjects and Themes:
- Subjects: ➤ Moral and ethical aspects - Security measures - Computer hackers - Computer security - Internet - Internet, security measures - Computer networks, security measures - Hackers
Edition Identifiers:
- The Open Library ID: OL22739238M
- Online Computer Library Center (OCLC) ID: 69013085
- Library of Congress Control Number (LCCN): 2006014412
- All ISBNs: 0763735361 - 9780763735364
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Internet security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
11Windows Internet security
By Seth Fogie and Cyrus Peikari

“Windows Internet security” Metadata:
- Title: Windows Internet security
- Authors: Seth FogieCyrus Peikari
- Language: English
- Number of Pages: Median: 400
- Publisher: Prentice Hall PTR
- Publish Date: 2001
“Windows Internet security” Subjects and Themes:
- Subjects: ➤ Sicherheit - Computer security - Internet - Security systems - Computer networks - Microsoft Windows (Computer file) - Windows 2000 - Security measures - Data security & data encryption - Internet - Network security - Microsoft Windows (Computer fi - Computers - Computer Data Security - Microcomputer Operating Environments - Operating Systems - Windows 2000 - Computers - Operating Systems - Textbooks - Computer Books: General - Internet - Security - Operating Systems - Windows - Computers / Security - Security - General - Security measures - Computer networks - Computer security - Windows (computer programs) - Internet, security measures
Edition Identifiers:
- The Open Library ID: OL7331776M - OL9286424M
- Library of Congress Control Number (LCCN): 2001059146
- All ISBNs: 0130428310 - 9780130428318
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Windows Internet security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
12Worried About the Wrong Things
By Jacqueline Ryan Vickery

“Worried About the Wrong Things” Metadata:
- Title: Worried About the Wrong Things
- Author: Jacqueline Ryan Vickery
- Language: English
- Number of Pages: Median: 360
- Publisher: The MIT Press - MIT Press
- Publish Date: 2017 - 2018
“Worried About the Wrong Things” Subjects and Themes:
- Subjects: ➤ Information society - Digital media - Information technology - Internet, safety measures - Internet, security measures - Internet and teenagers - Internet - Safety measures - Security measures - Social aspects
Edition Identifiers:
- The Open Library ID: OL29772293M - OL29361003M - OL29553320M - OL29772290M - OL27372323M
- Online Computer Library Center (OCLC) ID: 958796434
- Library of Congress Control Number (LCCN): 2016038045
- All ISBNs: ➤ 9780262339339 - 0262339331 - 9780262339322 - 026233934X - 0262536218 - 0262339323 - 9780262036023 - 0262036029 - 9780262339346 - 9780262536219
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Worried About the Wrong Things at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
13Trust in cyberspace
By Fred B. Schneider

“Trust in cyberspace” Metadata:
- Title: Trust in cyberspace
- Author: Fred B. Schneider
- Language: English
- Number of Pages: Median: 342
- Publisher: ➤ National Academy Press - National Academies Press
- Publish Date: 1999
- Publish Location: Washington, D.C
“Trust in cyberspace” Subjects and Themes:
- Subjects: ➤ Computer networks - Security measures - Telecommunication - Government policy - Internet - Umschulungswerkstätten für Siedler und Auswanderer - Telekommunikationspolitik - Verteiltes System - Telecommunication policy - Sicherheit - Computer Security - Atarazanas - Public Policy - Telecommunications - Réseaux d'ordinateurs - Sécurité - Mesures - Télécommunications - Politique gouvernementale - Sécurité informatique - COMPUTERS - Internet / Security - BUSINESS & ECONOMICS - Industries - Media & Communications - TECHNOLOGY & ENGINEERING - Electrical & Computer Engineering - Engineering & Applied Sciences - Internet, security measures - Computer science - Computer networks, security measures - Telecommunication policy, united states
Edition Identifiers:
- The Open Library ID: ➤ OL29046376M - OL40385173M - OL54067507M - OL40677718M - OL390510M - OL40677925M
- Online Computer Library Center (OCLC) ID: 40396180 - 42328939
- Library of Congress Control Number (LCCN): 98058061
- All ISBNs: ➤ 9780309065580 - 0309065585 - 0309205662 - 0309519705 - 0585022674 - 9780309205665 - 9780309131827 - 0309131820 - 9780309519700 - 9780585022673 - 9780309173988 - 0309173981
Access and General Info:
- First Year Published: 1999
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Trust in cyberspace at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
14Practical UNIX Security
By Simson Garfinkel and Gene Spafford

“Practical UNIX Security” Metadata:
- Title: Practical UNIX Security
- Authors: Simson GarfinkelGene Spafford
- Language: English
- Number of Pages: Median: 954
- Publisher: ➤ O'Reilly & Associates - O'Reilly Media, Incorporated - O'Reilly
- Publish Date: 1991 - 1996 - 2000 - 2003
- Publish Location: ➤ Bonn - Cambridge, MA - Sebastopol, CA - Beijing
“Practical UNIX Security” Subjects and Themes:
- Subjects: ➤ Computer security - Operating systems (Computers) - UNIX (Computer file) - Zaščita - Računalništvo - Računalniške mreže - Operacijski sistemi - Varnost - UNIX - Zascita - Racunalniske mreze - Racunalnistvo - Unix (computer operating system) - Congresses - Internet - Cryptographie - TCP-IP - Systèmes informatiques - Beveiliging - Mur pare-feu - UNIX (système d'exploitation des ordinateurs) - Sécurité informatique - Protection de l'information (informatique) - Accès - Mesures de sûreté - WWW - UUCP - Authentification - Datensicherung - Handbooks - Sistemas Operacionais (Computadores) - Contrôle - Ordinateurs - Sicherheit - Sécurité réseau - Internet, security measures - Systèmes d'exploitation (Ordinateurs) - Congrès - Operating systems - COMPUTERS - Security - General - Viruses - Com046030 - Cs.cmp_sc.opert_systm - Cs.cmp_sc.secur
Edition Identifiers:
- The Open Library ID: ➤ OL3383014M - OL574207M - OL36705367M - OL36777435M - OL36795925M - OL1320373M
- Online Computer Library Center (OCLC) ID: 24061343 - 47008633 - 51913726
- Library of Congress Control Number (LCCN): 96161185 - 2004557663 - 92195509
- All ISBNs: ➤ 1565921488 - 1449310125 - 0596150415 - 9781449310325 - 9781565921481 - 0937175722 - 9780596150419 - 9780596003234 - 0596003234 - 9780937175729 - 144931032X - 9781449310127
Author's Alternative Names:
"Simson L. Garfinkel"Access and General Info:
- First Year Published: 1991
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Borrowable
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find Practical UNIX Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
15The Cuckoo’s Egg
Tracking a Spy Through the Maze of Computer Espionage
By Clifford Stoll

“The Cuckoo’s Egg” Metadata:
- Title: The Cuckoo’s Egg
- Author: Clifford Stoll
- Languages: English - fre
- Number of Pages: Median: 378
- Publisher: ➤ Krüger - Albin Michel - Pan - Pocket Books - Fischer - The Bodley Head Ltd - Tandem Library - Doubleday - Pocket - Random House Audio - Bodley Head
- Publish Date: ➤ 1989 - 1990 - 1991 - 1998 - 2000 - 2005 - 2015
- Publish Location: ➤ London - Frankfurt - New York - Paris
“The Cuckoo’s Egg” Subjects and Themes:
- Subjects: ➤ Soviet Espionage - Computer crimes - Classified Defense information - Databases - Bases de datos - Espionaje ruso - Información clasificada (Defensa de la nación) - Computadoras - Control de acceso - Crimes par ordinateur - Espionnage soviétique - Secret-défense - Bases de données - Bases de dato - Informaciâon clasificada (Defensa de la naciâon) - Computerkriminalita t - Erlebnisbericht - New York Times reviewed - Fiction, mystery & detective, general - Espionage, soviet - Defense information, classified - It-säkerhet - Dataskydd - Spionage - Espionage, russian - Internet, security measures - Computers
- People: Markus Hess - Clifford Stoll
- Places: ➤ United States - Hannover - Germany - Germany (West) - Alemania (República Federal, 1949 1990 - Alemania (República Federal, 1949 1990) - Allemagne - États-Unis - Hanovre - EE. UU
Edition Identifiers:
- Google Books ID: 8poWAQAACAAJ
- The Open Library ID: ➤ OL47225015M - OL28325018M - OL28220690M - OL28332989M - OL9066203M - OL8456717M - OL9854552M - OL7663345M - OL2189508M - OL7949429M - OL8459191M - OL10489684M - OL7827440M - OL22425430M
- Online Computer Library Center (OCLC) ID: 22657134 - 28206819 - 61690806 - 19625854
- Library of Congress Control Number (LCCN): 00033654 - 89007808 - 2017416932
- All ISBNs: ➤ 9783596102778 - 3596307228 - 9783596139842 - 9781416507789 - 9783596307227 - 1417642629 - 9780385249461 - 3596102774 - 0743411463 - 9780553452556 - 1416507787 - 0671726889 - 0385249462 - 0370314336 - 9780330317429 - 9780370314334 - 9783810518620 - 055345255X - 9780671726881 - 9781417642625 - 9782226037817 - 0330317423 - 9780743411462 - 381051862X - 2226037810 - 3596139848
First Setence:
"ME, A WIZARD? UNTIL A WEEK AGO, I WAS AN ASTRONomer, contentedly designing telescope optics."
Author's Alternative Names:
"Cliff Stoll"Access and General Info:
- First Year Published: 1989
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Cuckoo’s Egg at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
16The web application hacker's handbook
By Dafydd Stuttard and Dafydd Stuttard

“The web application hacker's handbook” Metadata:
- Title: ➤ The web application hacker's handbook
- Authors: Dafydd StuttardDafydd Stuttard
- Language: English
- Number of Pages: Median: 840
- Publisher: ➤ Wiley Pub. - Wiley - John Wiley & Sons, Ltd. - Wiley & Sons, Incorporated, John - Wiley & Sons, Limited, John
- Publish Date: ➤ 2007 - 2008 - 2010 - 2011 - 2014
- Publish Location: ➤ Indianapolis - Indianapolis, IN - New York
“The web application hacker's handbook” Subjects and Themes:
- Subjects: ➤ Computer Technology - Nonfiction - Security measures - Computer security - Internet - Internet, security measures - Hackers - Application software - Handbooks, manuals - Internet--security measures - Tk5105.875.i57 s85 2008 - Internet--säkerhetsaspekter - Datasäkerhet - Internet -- security measures. sears - Computer security. sears - Tk5105.875.i57 s852 2011 - 005.8
Edition Identifiers:
- The Open Library ID: ➤ OL50509771M - OL39890486M - OL39887984M - OL39882008M - OL39878826M - OL29079436M - OL29079437M - OL25567215M - OL9402385M - OL23652494M - OL23531202M - OL24262697M
- Online Computer Library Center (OCLC) ID: 786167000 - 243693215 - 759159321 - 156994544
- Library of Congress Control Number (LCCN): 2011934639 - 2007029983
- All ISBNs: ➤ 9780470170779 - 9781118175224 - 0470644915 - 978-1-118-17523-1 - 1118175220 - 9781118079614 - 1118175239 - 0470237988 - 9781283258210 - 9788126533404 - 1118079612 - 1281100218 - 1283258218 - 8126533404 - 9780470644911 - 9781118175231 - 9781281100214 - 9781118026472 - 9781118175248 - 9780470237984 - 0470170778 - 978-1-118-17524-8 - 1118026470 - 1118175247
First Setence:
"This book is a practical guide to discovering and exploiting security flaws in web applications."
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The web application hacker's handbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
17The Art of Invisibility
The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
By Kevin D. Mitnick

“The Art of Invisibility” Metadata:
- Title: The Art of Invisibility
- Author: Kevin D. Mitnick
- Language: English
- Number of Pages: Median: 309
- Publisher: ➤ Little, Brown and Company - Hachette Book Group USA
- Publish Date: 2017
- Publish Location: New York
“The Art of Invisibility” Subjects and Themes:
- Subjects: ➤ Personal Computers - TECHNOLOGY & ENGINEERING - Web - Social Aspects - Online Safety & Privacy - Social Media - COMPUTERS - Right of Privacy - Data protection - Mobile Devices - Hardware - Computer security - Internet - Security - Security measures - Telecommunications - Mobile & Wireless Communications - Internet, security measures - Privacy, right of
Edition Identifiers:
- The Open Library ID: OL26241338M - OL27732598M
- Online Computer Library Center (OCLC) ID: 951711109
- Library of Congress Control Number (LCCN): 2016024302
- All ISBNs: 0316554545 - 9780316380508 - 9780316554541 - 0316380504
Author's Alternative Names:
"Kevin Mitnick", "Kevim Mitnick", "Kevin D Mitnick", "KD Mitnick", "Kevin David Mitnick" and "Kevin MITNICK"Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Art of Invisibility at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
18Cyber Security Education
By Greg Austin
“Cyber Security Education” Metadata:
- Title: Cyber Security Education
- Author: Greg Austin
- Language: English
- Number of Pages: Median: 226
- Publisher: Taylor & Francis Group
- Publish Date: 2020
“Cyber Security Education” Subjects and Themes:
- Subjects: ➤ Liberty - Internet, security measures - International relations - National security - Computer security - Study and teaching - Computer networks - Security measures - Sécurité informatique - Étude et enseignement
Edition Identifiers:
- The Open Library ID: ➤ OL29508130M - OL29508133M - OL29508171M - OL34674021M - OL34674019M - OL29508135M
- Online Computer Library Center (OCLC) ID: 1157365277
- Library of Congress Control Number (LCCN): 2020013079
- All ISBNs: ➤ 0367421925 - 100016800X - 9780367421915 - 0367822571 - 1000167984 - 1000168026 - 9781000168006 - 9781000167986 - 0367421917 - 9780367421922 - 9781000168020 - 9780367822576
Access and General Info:
- First Year Published: 2020
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Cyber Security Education at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
19Art of Invisibility
By Kevin D. Mitnick

“Art of Invisibility” Metadata:
- Title: Art of Invisibility
- Author: Kevin D. Mitnick
- Language: English
- Number of Pages: Median: 320
- Publisher: ➤ Hachette Book Group USA - Little Brown & Company
- Publish Date: 2017 - 2018 - 2019
“Art of Invisibility” Subjects and Themes:
- Subjects: Computer security - Data protection - Privacy, right of - Internet, security measures
Edition Identifiers:
- The Open Library ID: OL29408041M - OL29742767M - OL31995555M
- All ISBNs: ➤ 0316526924 - 0316380490 - 0316380520 - 9780316380492 - 9780316380522 - 9780316526920
Author's Alternative Names:
"Kevin MITNICK", "Kevin David Mitnick", "Kevim Mitnick", "Kevin D Mitnick", "Kevin Mitnick" and "KD Mitnick"Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Art of Invisibility at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
20Click here to kill everybody
By Bruce Schneier

“Click here to kill everybody” Metadata:
- Title: Click here to kill everybody
- Author: Bruce Schneier
- Language: English
- Number of Pages: Median: 319
- Publisher: W.W. Norton & Company
- Publish Date: 2018
“Click here to kill everybody” Subjects and Themes:
- Subjects: ➤ Safety measures - Government policy - POLITICAL SCIENCE / Political Process / Media & Internet - Computer crimes - Internet - POLITICAL SCIENCE / Privacy & Surveillance - Security measures - COMPUTERS / Security / Online Safety & Privacy - Internet, security measures - Internet, safety measures - Internet, government policy
Edition Identifiers:
- The Open Library ID: OL26678357M
- Online Computer Library Center (OCLC) ID: 1041574783
- Library of Congress Control Number (LCCN): 2018026844
- All ISBNs: 9780393608885 - 0393608883
Access and General Info:
- First Year Published: 2018
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Click here to kill everybody at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
21Financial Cryptography and Data Security
By Jeremy Clark, Sarah Meiklejohn, Peter Y. A. Ryan, Dan Wallach, Michael Brenner and Kurt Rohloff

“Financial Cryptography and Data Security” Metadata:
- Title: ➤ Financial Cryptography and Data Security
- Authors: ➤ Jeremy ClarkSarah MeiklejohnPeter Y. A. RyanDan WallachMichael BrennerKurt Rohloff
- Language: English
- Number of Pages: Median: 323
- Publisher: ➤ Springer London, Limited - Springer
- Publish Date: ➤ 2013 - 2014 - 2015 - 2016 - 2017 - 2019 - 2020 - 2025
“Financial Cryptography and Data Security” Subjects and Themes:
- Subjects: ➤ Electronic funds transfers - Data encryption (computer science) - Electronic commerce - Computer security - Internet, security measures - Cryptography, data processing - System design - Computer networks, security measures - Internal security - Computer science - Data protection - Information systems - Systems and Data Security - Data Encryption - E-Commerce/e-business - Computer Appl. in Administrative Data Processing
Edition Identifiers:
- The Open Library ID: ➤ OL57532211M - OL28239582M - OL30907132M - OL29728105M - OL34528868M - OL28253524M - OL28249616M - OL28281516M - OL57550244M - OL30358706M - OL30527919M - OL28740778M - OL37229466M - OL28041391M
- All ISBNs: ➤ 3662447738 - 3662583860 - 9783662480502 - 9783662588192 - 3031786750 - 3662480506 - 9783662583869 - 9783642413216 - 364241320X - 9783031786754 - 9783319702773 - 9783662447734 - 3031786785 - 9783662533567 - 3030437248 - 9783030437244 - 9783031786785 - 3662588196 - 3642413196 - 9783319428260 - 3319428268 - 9783642413209 - 3662480514 - 9783642413193 - 3319702777 - 9783662480519 - 3662533561 - 3642413218
Author's Alternative Names:
"Peter Y A Ryan" and "Peter Y.A. Ryan"Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Financial Cryptography and Data Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
22Click Here to Kill Everybody
By Bruce Schneier

“Click Here to Kill Everybody” Metadata:
- Title: Click Here to Kill Everybody
- Author: Bruce Schneier
- Language: English
- Number of Pages: Median: 336
- Publisher: ➤ Audible Studios on Brilliance - Audible Studios on Brilliance Audio - MITP Verlags GmbH - Norton & Company, Incorporated, W. W.
- Publish Date: 2018 - 2019
“Click Here to Kill Everybody” Subjects and Themes:
- Subjects: Internet, security measures - Internet, safety measures - Internet, government policy - Computer crimes
Edition Identifiers:
- The Open Library ID: OL32898680M - OL29791264M - OL32513879M - OL28721846M
- All ISBNs: ➤ 3958459471 - 9780393357448 - 1721390049 - 9780393608892 - 0393608891 - 9783958459472 - 9781721390045 - 0393357449
Access and General Info:
- First Year Published: 2018
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Click Here to Kill Everybody at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
23Hacking
By Nitesh Dhanjani

“Hacking” Metadata:
- Title: Hacking
- Author: Nitesh Dhanjani
- Language: English
- Number of Pages: Median: 298
- Publisher: ➤ O'Reilly - O'Reilly Media, Incorporated
- Publish Date: 2009
- Publish Location: Sebastopol, CA - Beijing
“Hacking” Subjects and Themes:
- Subjects: ➤ Security measures - Computer security - Internet - Internet, security measures - Computer hackers - Computer networks - General - Security - Viruses - Com053000 - Cs.cmp_sc.app_sw - Cs.cmp_sc.secur
Edition Identifiers:
- The Open Library ID: OL36711804M - OL36801988M - OL25541583M
- Online Computer Library Center (OCLC) ID: 434904834 - 320188944
- Library of Congress Control Number (LCCN): 2010484033
- All ISBNs: ➤ 9780596154578 - 9781449379216 - 0596154577 - 1449379214 - 9781449391898 - 1449391893
Access and General Info:
- First Year Published: 2009
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Hacking at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
24Schneier on security
By Bruce Schneier

“Schneier on security” Metadata:
- Title: Schneier on security
- Author: Bruce Schneier
- Language: English
- Number of Pages: Median: 336
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley Pub.
- Publish Date: 2008 - 2009
- Publish Location: Indianapolis, IN
“Schneier on security” Subjects and Themes:
- Subjects: ➤ Computer networks - Computer security - Prevention - Privacy, Right of - Right of Privacy - Security measures - Terrorism - Cyberterrorism - Security systems - Evaluation - Information warfare - Technological innovations - Networking - COMPUTERS - Internet - Security - General - Internet, security measures
- Places: United States
Edition Identifiers:
- The Open Library ID: OL29011839M - OL29020059M - OL29035516M - OL17074683M
- Online Computer Library Center (OCLC) ID: 226356041
- Library of Congress Control Number (LCCN): 2008035466
- All ISBNs: ➤ 9780470395356 - 0470395354 - 0470505613 - 0470505621 - 9780470505625 - 9780470505601 - 9780470505618 - 0470505605
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Schneier on security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
25Wireless Mobile Internet Security
By Man Young Rhee

“Wireless Mobile Internet Security” Metadata:
- Title: ➤ Wireless Mobile Internet Security
- Author: Man Young Rhee
- Language: English
- Number of Pages: Median: 528
- Publisher: ➤ Wiley & Sons, Limited, John - Wiley & Sons, Incorporated, John - John Wiley & Sons Inc
- Publish Date: 2013 - 2014 - 2015
“Wireless Mobile Internet Security” Subjects and Themes:
- Subjects: Security measures - Wireless Internet - Internet, security measures - World wide web
Edition Identifiers:
- The Open Library ID: ➤ OL39882925M - OL33431780M - OL33960237M - OL26139435M - OL33446881M - OL33467478M - OL29161470M - OL33512380M - OL33961066M
- Online Computer Library Center (OCLC) ID: 858949352
- Library of Congress Control Number (LCCN): 2012040165 - 2013001154
- All ISBNs: ➤ 9781118512944 - 1118512928 - 1299449425 - 1118892062 - 1119094577 - 9781118512999 - 9781118512852 - 1119142946 - 1118512944 - 9781299449428 - 9781119142942 - 1118512855 - 9781118496534 - 9781119094579 - 1118512995 - 9781118892060 - 9781118512920 - 1118496531
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Wireless Mobile Internet Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
26The Internet Police: How Crime Went Online, and the Cops Followed
By Nate Anderson

“The Internet Police: How Crime Went Online, and the Cops Followed” Metadata:
- Title: ➤ The Internet Police: How Crime Went Online, and the Cops Followed
- Author: Nate Anderson
- Language: English
- Number of Pages: Median: 320
- Publisher: ➤ W. W. Norton & Company - Norton & Company, Incorporated, W. W. - W W Norton
- Publish Date: 2013 - 2014
“The Internet Police: How Crime Went Online, and the Cops Followed” Subjects and Themes:
- Subjects: ➤ Internet - Computer crimes - Security measures - Investigation - International crimes - Computer security - Internet, security measures
Edition Identifiers:
- The Open Library ID: OL29668161M - OL28518902M - OL26774266M
- Online Computer Library Center (OCLC) ID: 857404734 - 841187573
- Library of Congress Control Number (LCCN): 2015414021 - 2013013978
- All ISBNs: ➤ 9780393349450 - 0393240541 - 0393062988 - 0393349454 - 9780393240542 - 9780393062984
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The Internet Police: How Crime Went Online, and the Cops Followed at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
27Cyber Security and Privacy
By Frances Cleary and Massimo Felici

“Cyber Security and Privacy” Metadata:
- Title: Cyber Security and Privacy
- Authors: Frances ClearyMassimo Felici
- Language: English
- Number of Pages: Median: 177
- Publisher: ➤ Springer - Springer London, Limited
- Publish Date: 2013 - 2014 - 2015 - 2017
“Cyber Security and Privacy” Subjects and Themes:
- Subjects: ➤ Computer security - Internet, security measures - Computer networks, security measures - Data protection - Database management - Information resources management - Computer science - Computer Communication Networks - Information systems - Systems and Data Security - Computers and Society - Computer Appl. in Administrative Data Processing - Computer Science, general
Edition Identifiers:
- The Open Library ID: ➤ OL27972750M - OL30558949M - OL28039552M - OL34526103M - OL37236209M - OL34521572M - OL28406682M - OL28004863M
- All ISBNs: ➤ 3319125753 - 9783642412042 - 3319125745 - 9783319125732 - 9783319125749 - 3319125737 - 9783319253596 - 9783319125756 - 331925359X - 9783642412066 - 364241205X - 9783642412059 - 3642412068 - 3642412041 - 9783319253602 - 3319253603
Access and General Info:
- First Year Published: 2013
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Cyber Security and Privacy at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
28Critical Incident Management
By Alan B. Sterneckert

“Critical Incident Management” Metadata:
- Title: Critical Incident Management
- Author: Alan B. Sterneckert
- Language: English
- Number of Pages: Median: 524
- Publisher: ➤ AUERBACH - Auerbach Publishers, Incorporated - Taylor & Francis Group - Auerbach
- Publish Date: 2003 - 2004 - 2019
- Publish Location: Boca Raton
“Critical Incident Management” Subjects and Themes:
- Subjects: ➤ Management - Organizational effectiveness - Risk management - Computer security - Internet, security measures - Efficacité organisationnelle - Gestion du risque - Gestion - BUSINESS & ECONOMICS - Workplace Culture - Corporate Governance - Leadership - Organizational Development
Edition Identifiers:
- The Open Library ID: ➤ OL37982473M - OL37978515M - OL36757009M - OL36701934M - OL34655426M - OL33441474M - OL18727898M - OL8258499M
- Online Computer Library Center (OCLC) ID: 52197635 - 62157905
- Library of Congress Control Number (LCCN): 2003051841
- All ISBNs: ➤ 084930010X - 9781280289316 - 9780849300103 - 1135517878 - 0367394944 - 9780367394943 - 9780429120794 - 0429120796 - 1420000047 - 9781420000047 - 1280289317 - 9781135517878 - 9781135517830 - 1135517835
First Setence:
"There was a time when computers occupied entire buildings with their support units staffed by hundreds of workers."
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Critical Incident Management at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
29Phishing Exposed
By Lance James

“Phishing Exposed” Metadata:
- Title: Phishing Exposed
- Author: Lance James
- Language: English
- Number of Pages: Median: 450
- Publisher: ➤ Elsevier Science & Technology Books - Syngress
- Publish Date: 2005
“Phishing Exposed” Subjects and Themes:
- Subjects: ➤ Phishing - Internet fraud - Identity theft - Network security - Computers - General Information - Computers - Computer Books: General - General - Computer security - Computers / General - Computers / General Information - Computers / Security - Phisher, Phishing, Anti-Phishing, Malware, Berbew, Mitgleider, Trojan, download, win32.Show, FSG, ASPACK, Forensics, Author analysis, research, spam research, phishing research, intelligence, Secure Science Corporation, Lance James, email scams, identity theft, spam, phishers - Prevention - True Crime/General - Security - General - Criminalitâe informatique - Mesures - Râeseaux d'ordinateurs - Sâecuritâe - Internet, security measures - Electronic commerce - Electronic mail systems - Security measures
Edition Identifiers:
- The Open Library ID: OL35750190M - OL8894012M
- Online Computer Library Center (OCLC) ID: 62408539 - 824876115
- All ISBNs: 159749030X - 9781597490306 - 0080489532 - 9780080489537
Access and General Info:
- First Year Published: 2005
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Phishing Exposed at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
30Internet Security
By Man Young Rhee

“Internet Security” Metadata:
- Title: Internet Security
- Author: Man Young Rhee
- Language: English
- Number of Pages: Median: 424
- Publisher: ➤ Wiley & Sons, Incorporated, John - Wiley
- Publish Date: 2003 - 2007
“Internet Security” Subjects and Themes:
- Subjects: ➤ Internet - Security measures - Data encryption (Computer science) - Public key cryptography - Internet, security measures - Data encryption (computer science)
Edition Identifiers:
- The Open Library ID: OL7598074M - OL28960954M - OL29112227M - OL39887876M
- Online Computer Library Center (OCLC) ID: 50898548
- Library of Congress Control Number (LCCN): 2002191050
- All ISBNs: ➤ 9780470339367 - 9780470862469 - 9780470852859 - 0470339365 - 0470862467 - 9781280271557 - 0470852852 - 1280271558
First Setence:
"The Internet today is a widespread information infrastructure, but it is inherently an insecure channel for sending messages."
Access and General Info:
- First Year Published: 2003
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Internet Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
31The dotCrime Manifesto
By Phillip Hallam-Baker

“The dotCrime Manifesto” Metadata:
- Title: The dotCrime Manifesto
- Author: Phillip Hallam-Baker
- Language: English
- Number of Pages: Median: 456
- Publisher: ➤ Addison Wesley Professional - Addison-Wesley Professional - Addison-Wesley - Pearson Education, Limited
- Publish Date: 2007 - 2008
- Publish Location: Upper Saddle River, N.J
“The dotCrime Manifesto” Subjects and Themes:
- Subjects: ➤ Internet, security measures - Computer networks, security measures - Computer crimes - Prevention - Internet - Crime prevention
Edition Identifiers:
- The Open Library ID: OL29006187M - OL49966337M - OL34007940M - OL35569301M - OL10461147M
- Online Computer Library Center (OCLC) ID: 166386648 - 213482826
- Library of Congress Control Number (LCCN): 2007041798
- All ISBNs: ➤ 0132160382 - 0321544714 - 9780132701976 - 9780321503589 - 0321552695 - 9780321552693 - 0132701979 - 9780132160384 - 0321503589 - 9780321544711
Access and General Info:
- First Year Published: 2007
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The dotCrime Manifesto at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
32The personal Internet security guidebook
By Tim Speed, Juanita Ellis and Steffano Korper

“The personal Internet security guidebook” Metadata:
- Title: ➤ The personal Internet security guidebook
- Authors: Tim SpeedJuanita EllisSteffano Korper
- Language: English
- Number of Pages: Median: 280
- Publisher: ➤ Academic Press - Elsevier Science & Technology Books - Academic
- Publish Date: 2001 - 2002
- Publish Location: San Diego, Calif - London
“The personal Internet security guidebook” Subjects and Themes:
- Subjects: ➤ Security measures - Internet - Home computer networks - Securite - Mesures - Internet, security measures - Computer security
Edition Identifiers:
- The Open Library ID: OL7329079M - OL39922523M - OL18387118M - OL9283727M
- Online Computer Library Center (OCLC) ID: 47726175
- Library of Congress Control Number (LCCN): 2001091437
- All ISBNs: 9780080513720 - 0126565619 - 0080513727 - 9780126565614
First Setence:
"The government has for years been sending out radio signals to our brains with secret messages."
Access and General Info:
- First Year Published: 2001
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The personal Internet security guidebook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
33Intelligent Mobile Malware Detection
By Tony Thomas, Roopak Surendran, Teenu S. John and Mamoun Alazab
“Intelligent Mobile Malware Detection” Metadata:
- Title: ➤ Intelligent Mobile Malware Detection
- Authors: Tony ThomasRoopak SurendranTeenu S. JohnMamoun Alazab
- Language: English
- Number of Pages: Median: 174
- Publisher: ➤ CRC Press LLC - Taylor & Francis Group
- Publish Date: 2022 - 2024
“Intelligent Mobile Malware Detection” Subjects and Themes:
- Subjects: ➤ Smartphones, programming - Computer networks, security measures - Data encryption (computer science) - Internet, security measures - Computer security - Computer networks - Computer viruses
Edition Identifiers:
- The Open Library ID: OL39644793M - OL57530763M - OL39647097M - OL39658541M - OL42845272M
- All ISBNs: ➤ 1032421096 - 1000824985 - 0367638711 - 1003121519 - 9781000824988 - 1000824977 - 9780367638719 - 9781003121510 - 9781000824971 - 9781032421094
Access and General Info:
- First Year Published: 2022
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Intelligent Mobile Malware Detection at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
34Routledge Companion to Global Cyber-Security Strategy
By Scott N. Romaniuk and Mary Manjikian

“Routledge Companion to Global Cyber-Security Strategy” Metadata:
- Title: ➤ Routledge Companion to Global Cyber-Security Strategy
- Authors: Scott N. RomaniukMary Manjikian
- Language: English
- Number of Pages: Median: 560
- Publisher: Taylor & Francis Group
- Publish Date: 2020 - 2021 - 2023
“Routledge Companion to Global Cyber-Security Strategy” Subjects and Themes:
- Subjects: ➤ Strategy - Internet, security measures - International relations - National security - Cyberspace - Security measures - Government policy - Cyberterrorism - Prevention - Computer crimes - Computer security - Internet - Computer networks - Sécurité informatique - Politique gouvernementale - Sécurité - Mesures - Réseaux d'ordinateurs - POLITICAL SCIENCE / Political Freedom & Security / International Security - HISTORY / Military / Strategy - COMPUTERS / Internet / Security
Edition Identifiers:
- The Open Library ID: ➤ OL29529085M - OL29530536M - OL46569080M - OL29530228M - OL29530267M - OL34667445M
- Online Computer Library Center (OCLC) ID: 1158506535
- Library of Congress Control Number (LCCN): 2020024630
- All ISBNs: ➤ 0429680368 - 9780367024239 - 9780367620660 - 042968035X - 9780429399718 - 0429680376 - 9780429680366 - 0367620669 - 0429399715 - 9780429680359 - 9780429680373 - 0367024233
Access and General Info:
- First Year Published: 2020
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Routledge Companion to Global Cyber-Security Strategy at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
35Chinese Cybersecurity and Defense
By Daniel Ventre

“Chinese Cybersecurity and Defense” Metadata:
- Title: ➤ Chinese Cybersecurity and Defense
- Author: Daniel Ventre
- Language: English
- Number of Pages: Median: 320
- Publisher: ➤ Wiley-ISTE - Wiley-Interscience - Wiley & Sons, Incorporated, John
- Publish Date: 2014 - 2015
“Chinese Cybersecurity and Defense” Subjects and Themes:
- Subjects: ➤ Internet, security measures - China, social conditions - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: ➤ OL33485926M - OL39937822M - OL31395368M - OL29258493M - OL33540268M - OL29270764M
- All ISBNs: ➤ 9781118816103 - 9781848216143 - 1119009006 - 1848216149 - 1119009138 - 9781118814840 - 1118816102 - 9781119009139 - 1118814843 - 9781119009009 - 1119009014 - 9781119009016
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Chinese Cybersecurity and Defense at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
36Wireless Internet security
By James Kempf

“Wireless Internet security” Metadata:
- Title: Wireless Internet security
- Author: James Kempf
- Language: English
- Number of Pages: Median: 212
- Publisher: Cambridge University Press
- Publish Date: 2008 - 2010
- Publish Location: New York
“Wireless Internet security” Subjects and Themes:
Edition Identifiers:
- The Open Library ID: ➤ OL40487334M - OL34450730M - OL40784872M - OL40500523M - OL16887956M - OL40476289M
- Library of Congress Control Number (LCCN): 2008023549
- All ISBNs: ➤ 0511436483 - 0521887836 - 9780511437267 - 9780511438608 - 9780511436482 - 9780521887830 - 9780511754739 - 0511437269 - 0511434316 - 0511438605 - 9780511434310 - 0511754736
Access and General Info:
- First Year Published: 2008
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: Unclassified
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Wireless Internet security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
37Securing the internet of things
By Shancang Li

“Securing the internet of things” Metadata:
- Title: ➤ Securing the internet of things
- Author: Shancang Li
- Language: English
- Number of Pages: Median: 149
- Publisher: ➤ Elsevier Science & Technology Books - Syngress
- Publish Date: 2017
“Securing the internet of things” Subjects and Themes:
- Subjects: Computer networks - Security measures - Computer security - Internet of things - Internet, security measures
Edition Identifiers:
- The Open Library ID: OL27228657M - OL34525734M
- Online Computer Library Center (OCLC) ID: 972324781
- All ISBNs: 0128045051 - 0128044586 - 9780128044582 - 9780128045053
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Securing the internet of things at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
38Mobile Internet Security
By Ilsun You, Hsing-Chung Chen, Vishal Sharma and Igor Kotenko

“Mobile Internet Security” Metadata:
- Title: Mobile Internet Security
- Authors: Ilsun YouHsing-Chung ChenVishal SharmaIgor Kotenko
- Language: English
- Number of Pages: Median: 189
- Publisher: ➤ Springer Singapore Pte. Limited - Springer
- Publish Date: ➤ 2018 - 2020 - 2022 - 2023 - 2024
“Mobile Internet Security” Subjects and Themes:
Edition Identifiers:
- The Open Library ID: ➤ OL28232983M - OL48687111M - OL51806223M - OL28203698M - OL36766094M - OL36248396M
- All ISBNs: ➤ 9789819744640 - 9819944295 - 981169575X - 9811596085 - 9789811695759 - 9811337314 - 9789811596087 - 9819744644 - 9789811337314 - 9789811078491 - 9789819944293 - 9811078491
Access and General Info:
- First Year Published: 2018
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Mobile Internet Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
39Artificial Intelligence and Security Challenges in Emerging Networks
By Ryma Abassi

“Artificial Intelligence and Security Challenges in Emerging Networks” Metadata:
- Title: ➤ Artificial Intelligence and Security Challenges in Emerging Networks
- Author: Ryma Abassi
- Language: English
- Number of Pages: Median: 293
- Publisher: IGI Global
- Publish Date: 2019
“Artificial Intelligence and Security Challenges in Emerging Networks” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Internet, security measures - Malware (computer software) - Artificial intelligence
Edition Identifiers:
- The Open Library ID: OL56767704M - OL56856007M - OL56767762M - OL27751879M - OL37320153M
- All ISBNs: ➤ 9781522573531 - 9781522573555 - 1522573534 - 152258255X - 1522586172 - 9781522573548 - 9781522582557 - 9781522586173 - 1522573542 - 1522573550
Access and General Info:
- First Year Published: 2019
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Artificial Intelligence and Security Challenges in Emerging Networks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
40Risks and Security of Internet and Systems
By Frédéric Cuppens, Nora Cuppens, Jean-Louis Lanet and Axel Legay

“Risks and Security of Internet and Systems” Metadata:
- Title: ➤ Risks and Security of Internet and Systems
- Authors: Frédéric CuppensNora CuppensJean-Louis LanetAxel Legay
- Language: English
- Number of Pages: Median: 263
- Publisher: ➤ Springer International Publishing AG - Springer
- Publish Date: ➤ 2017 - 2018 - 2019 - 2020 - 2021 - 2022
“Risks and Security of Internet and Systems” Subjects and Themes:
- Subjects: ➤ Computer networks, security measures - Internet - Internet, security measures - Computer security
Edition Identifiers:
- The Open Library ID: ➤ OL37322311M - OL28035433M - OL28202213M - OL30793146M - OL28182206M - OL37998950M
- All ISBNs: ➤ 9783030121426 - 3030415678 - 3031020669 - 3030121429 - 3030688860 - 9783031020667 - 3319766864 - 9783319766867 - 9783030415679 - 9783319548753 - 3319548751 - 9783030688868
Access and General Info:
- First Year Published: 2017
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Risks and Security of Internet and Systems at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
41Burp Suite Cookbook
By Sunny Wear

“Burp Suite Cookbook” Metadata:
- Title: Burp Suite Cookbook
- Author: Sunny Wear
- Language: English
- Number of Pages: Median: 358
- Publisher: ➤ Packt Publishing - de Gruyter GmbH, Walter
- Publish Date: 2018 - 2023
“Burp Suite Cookbook” Subjects and Themes:
- Subjects: Internet, security measures - Computer security
Edition Identifiers:
- The Open Library ID: OL51781488M - OL27804946M - OL51797989M
- All ISBNs: ➤ 9781835088616 - 178953173X - 9781789531732 - 1789539277 - 1835088619 - 9781789539271
Access and General Info:
- First Year Published: 2018
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Burp Suite Cookbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
42International Relations in the Cyber Age
By Nazli Choucri and David D. Clark

“International Relations in the Cyber Age” Metadata:
- Title: ➤ International Relations in the Cyber Age
- Authors: Nazli ChoucriDavid D. Clark
- Language: English
- Number of Pages: Median: 432
- Publisher: MIT Press - The MIT Press
- Publish Date: 2019
“International Relations in the Cyber Age” Subjects and Themes:
- Subjects: ➤ Internet, political aspects - Internet, security measures - Computer networks, security measures - Internet and international relations - Internet - Political aspects - Security measures - Computer networks
Edition Identifiers:
- The Open Library ID: OL27337029M - OL29812912M - OL29812945M - OL29812915M
- Online Computer Library Center (OCLC) ID: 1038034428
- Library of Congress Control Number (LCCN): 2018010197
- All ISBNs: ➤ 9780262349703 - 0262349701 - 0262349728 - 026234971X - 0262038919 - 9780262038911 - 9780262349710 - 9780262349727
Access and General Info:
- First Year Published: 2019
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find International Relations in the Cyber Age at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
43Norton Internet Security For Dummies
By Greg Holden

“Norton Internet Security For Dummies” Metadata:
- Title: ➤ Norton Internet Security For Dummies
- Author: Greg Holden
- Language: English
- Number of Pages: Median: 373
- Publisher: Wiley Pub. - For Dummies
- Publish Date: 2004
- Publish Location: Hoboken, NJ
“Norton Internet Security For Dummies” Subjects and Themes:
- Subjects: ➤ Computer networks - Internet - Security measures - Norton Internet security - Norton Internet Security 2004 - Internet, security measures
Edition Identifiers:
- The Open Library ID: OL8051615M - OL22995194M
- Online Computer Library Center (OCLC) ID: 56909602
- Library of Congress Control Number (LCCN): 2004107900
- All ISBNs: 9780764575778 - 0764575775
First Setence:
"The term security isn't one that leaps to mind when you think about the Internet."
Access and General Info:
- First Year Published: 2004
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Norton Internet Security For Dummies at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
44Phishing and countermeasures
By Markus Jakobsson

“Phishing and countermeasures” Metadata:
- Title: Phishing and countermeasures
- Author: Markus Jakobsson
- Language: English
- Number of Pages: Median: 720
- Publisher: ➤ Wiley & Sons Canada, Limited, John - Wiley & Sons, Incorporated, John - Wiley-Interscience
- Publish Date: 2006
“Phishing and countermeasures” Subjects and Themes:
- Subjects: Phishing - Identity theft - Prevention - Computer security - Internet, security measures
Edition Identifiers:
- The Open Library ID: OL7621469M - OL48692820M - OL28999482M - OL48645022M
- Online Computer Library Center (OCLC) ID: 70129025
- Library of Congress Control Number (LCCN): 2006016019
- All ISBNs: ➤ 0471782459 - 9780470086094 - 9781280821967 - 1280821965 - 0470086106 - 9780471782452 - 9780470086100 - 0470086092
Access and General Info:
- First Year Published: 2006
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Phishing and countermeasures at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
45Anonymous Communication Networks
By Kun Peng

“Anonymous Communication Networks” Metadata:
- Title: ➤ Anonymous Communication Networks
- Author: Kun Peng
- Language: English
- Number of Pages: Median: 202
- Publisher: ➤ Taylor & Francis Ltd - Auerbach Publishers, Incorporated - Taylor & Francis Group
- Publish Date: 2014 - 2019
“Anonymous Communication Networks” Subjects and Themes:
- Subjects: ➤ Internet - Security measures - Computer networks - Right of Privacy - Data protection - Internet, security measures - Computer networks, security measures - Privacy, right of - Identity (psychology) - Online identities - Sécurité - Mesures - Réseaux d'ordinateurs - Protection de l'information (Informatique) - Identité numérique - COMPUTERS - Security - Networking - Online Safety & Privacy
Edition Identifiers:
- The Open Library ID: OL37957601M - OL33664400M - OL37978334M - OL26154265M - OL33532279M
- Online Computer Library Center (OCLC) ID: 878149143
- Library of Congress Control Number (LCCN): 2014001317
- All ISBNs: ➤ 143988157X - 143988160X - 9781439881576 - 0429066678 - 9781306577939 - 0367378736 - 1306577934 - 9780367378738 - 9781439881606 - 9780429066672
Access and General Info:
- First Year Published: 2014
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Anonymous Communication Networks at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
46Information security management handbook
By Micki Krause Nozaki and Harold F. Tipton

“Information security management handbook” Metadata:
- Title: ➤ Information security management handbook
- Authors: Micki Krause NozakiHarold F. Tipton
- Language: English
- Number of Pages: Median: 597
- Publisher: Auerbach - AUERBACH
- Publish Date: 1999 - 2000
- Publish Location: Boca Raton, FL
“Information security management handbook” Subjects and Themes:
- Subjects: ➤ Data protection - Management - Handbooks, manuals - Computer security - Internet, security measures - Information resources management - Industries, security measures
Edition Identifiers:
- The Open Library ID: OL17005229M - OL8261683M
- Online Computer Library Center (OCLC) ID: 42009427
- Library of Congress Control Number (LCCN): 99042823
- All ISBNs: 9780849308000 - 0849398290 - 0849308003 - 9780849398292
Access and General Info:
- First Year Published: 1999
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Information security management handbook at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
47The death of the Internet
By Markus Jakobsson

“The death of the Internet” Metadata:
- Title: The death of the Internet
- Author: Markus Jakobsson
- Language: English
- Number of Pages: Median: 386
- Publisher: ➤ IEEE Computer Society Press - Higher Education Press - John Wiley & Sons, Inc. - Wiley & Sons, Limited, John
- Publish Date: 2012 - 2013
- Publish Location: Beijing - Hoboken, New Jersey
“The death of the Internet” Subjects and Themes:
- Subjects: ➤ Electronic commerce - COMPUTERS / Security / General - Data protection - Computer crimes - Internet - Security measures - Computer related crime - Säkerhetsaspekter - COMPUTERS - Databrott - General - Smartphones - Security - Computer privacy and security - Internet, security measures
Edition Identifiers:
- The Open Library ID: ➤ OL29115290M - OL39883122M - OL29115291M - OL43326448M - OL29138191M - OL25121915M
- Online Computer Library Center (OCLC) ID: 881013008
- Library of Congress Control Number (LCCN): 2011047198
- All ISBNs: ➤ 1118488164 - 1118312554 - 9787040301175 - 9781118312544 - 1118312546 - 9781118312537 - 9781118312551 - 9781118488164 - 1118062418 - 7040301172 - 9781118062418 - 1118312538
Access and General Info:
- First Year Published: 2012
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find The death of the Internet at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
48Handbook of financial cryptography and security
By Burton Rosenberg

“Handbook of financial cryptography and security” Metadata:
- Title: ➤ Handbook of financial cryptography and security
- Author: Burton Rosenberg
- Language: English
- Number of Pages: Median: 631
- Publisher: ➤ Chapman & Hall/CRC - Taylor & Francis Group - CRC Press LLC
- Publish Date: 2010 - 2011 - 2024
- Publish Location: Boca Raton
“Handbook of financial cryptography and security” Subjects and Themes:
- Subjects: ➤ Electronic funds transfers - Data encryption (Computer science) - Internet - Electronic commerce - Computer networks - Security measures - Internet, security measures - Data encryption (computer science)
Edition Identifiers:
- The Open Library ID: OL57537058M - OL33727760M - OL33517459M - OL29012692M - OL24902497M
- Library of Congress Control Number (LCCN): 2010018118
- All ISBNs: ➤ 9781420059816 - 1420059823 - 9781322613628 - 9780429150258 - 9781420059823 - 0429150253 - 9781032918075 - 1322613621 - 1420059815 - 1032918071
Access and General Info:
- First Year Published: 2010
- Is Full Text Available: No
- Is The Book Public: No
- Access Status: No_ebook
Online Marketplaces
Find Handbook of financial cryptography and security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
49Designing Network Security
By Merike Kaeo

“Designing Network Security” Metadata:
- Title: Designing Network Security
- Author: Merike Kaeo
- Language: English
- Number of Pages: Median: 597
- Publisher: ➤ Cisco Press - Pearson Education, Limited
- Publish Date: 1999 - 2003
“Designing Network Security” Subjects and Themes:
- Subjects: ➤ Securite - Internet - Computer networks - Securite informatique - Mesures de surete - Protection de l'information (Informatique) - Computer security - Mesures - Reseaux d'ordinateurs - Security measures - Internet, security measures - Computer networks, security measures
Edition Identifiers:
- The Open Library ID: OL29053845M - OL8755218M - OL35568890M
- All ISBNs: ➤ 1578700434 - 1587053705 - 9781587053702 - 158714249X - 9781578700431 - 9781587142499
Access and General Info:
- First Year Published: 1999
- Is Full Text Available: Yes
- Is The Book Public: No
- Access Status: Printdisabled
Online Access
Downloads Are Not Available:
The book is not public therefore the download links will not allow the download of the entire book, however, borrowing the book online is available.
Online Borrowing:
Online Marketplaces
Find Designing Network Security at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.
50The Future of the Internet-And How to Stop It
By Jonathan L. Zittrain

“The Future of the Internet-And How to Stop It” Metadata:
- Title: ➤ The Future of the Internet-And How to Stop It
- Author: Jonathan L. Zittrain
- Language: English
- Number of Pages: Median: 352
- Publisher: ➤ Yale University Press - Penguin Books, Limited
- Publish Date: 2008 - 2009
- Publish Location: New Haven - New Haven [Conn.]
“The Future of the Internet-And How to Stop It” Subjects and Themes:
- Subjects: ➤ Social aspects - Security measures - Internet - Säkerhetsaspekter - Informationsüberlastung - Informationsgesellschaft - Sociale aspecten - Datensicherung - Sociala aspekter - Sicherheitsmassnahme - Toekomstverwachtingen - Internet, social aspects - Internet, security measures - Law - Nonfiction - Technology - Authors Alliance - Communication and technology - Technologies de l'information et de la communication
Edition Identifiers:
- The Open Library ID: ➤ OL38347291M - OL24318657M - OL24654154M - OL24764427M - OL28453851M - OL38797651M - OL10319529M - OL27002268M
- Online Computer Library Center (OCLC) ID: 235372868 - 422452436 - 179832240
- Library of Congress Control Number (LCCN): 2008942463 - 2007050361
- All ISBNs: ➤ 9780300151244 - 9780300144772 - 014103159X - 9780141951812 - 9780300144710 - 0300144733 - 9780300124873 - 0300124872 - 9780141031590 - 0300144776 - 0141951818 - 0300151241 - 0300144717 - 9780300144734
Author's Alternative Names:
"Jonathan L Zittrain", "Zittrain" and "Jonathan Zittrain"Access and General Info:
- First Year Published: 2008
- Is Full Text Available: Yes
- Is The Book Public: Yes
- Access Status: Public
Online Access
Downloads:
- Number of Results: 4
- 1: futureoftheinternetandhow00zitt
- 2: futureofinternet0000zitt
- 3: futureofinternet00zitt
- 4: futureofinternet00zitt
Online Borrowing:
- Borrowing from Open Library: Borrowing link
- Borrowing from Archive.org: Borrowing link
Online Marketplaces
Find The Future of the Internet-And How to Stop It at online marketplaces:
- Amazon: Audiable, Kindle and printed editions.
- Ebay: New & used books.